A major part of a contingency plan is to provide _____
redundancy
Using this type of card will include better protection against online fraud
credit card
This type of backup allows data to be restored quickly when a file has been lost.
Local Backup
A good disaster recovery plan needs to be _________ by the other components of the business continuity plan.
informed
Using a Caesar Cipher shift 3 decrypt the following :
khoor zruog
hello world
an area used to store and share such things as computer systems, applications, data, and components such as switches and routers.
Data center
Using this connection ensures that your financial data will be encrypted and less likely to be stolen by a hacker.
HTTPS
These backups are particularly important before installing new applications or making significant configuration changes.
System Backups
By understanding the most critical business functions IT administrators can do this to know what systems need to be restored first after a disaster.
Prioritization
Using a Caesar Cipher shift 7 decrypt the following :
aol mve qbtwz vcly aol mlujl
the fox jumps over the fence
With this strategy, all data is stored on two or more disks simultaneously.
RAID Redundant Array of Independent Disks
Never conduct ecommerce transactions using _______
public WiFi
This type of backup uses Transaction log backups
Database backups
Data restoration plans need to verify that the data have not been ______________________
corrupted
Using a Caesar Cipher shift 4 decrypt the following :
aew mx e gex m wea
was it a cat I saw
Installing multiple network interface cards into the server is a way to to provide ________________
Network Redundancy
When conducting transactions online we need to adopt safeguards to protect ourselves against __________
identity theft
These devices contain one or more hard drives that users can access over the network and can be used for file sharing, backups, and even streaming media.
Network Attached Storage (NAS)
Intangible impacts estimated when planning for disasters
loss of customer trust
Using a Caesar Cipher shift 9 decrypt the following :
bqn bnuub bnj bqnuub kh cqn bnj bqxan
she sells sea shells by the sea shore
This is a large battery that's connected both to the computer and the wall outlet.
UPS
When conducting ecommerce transactions it'll be a good practice to examine URLs closely to make sure they don't include __________________________
misspellings of legitimate sites.
This provides a convenient, flexible, and scalable alternative to traditional backup methods, and in some cases can fulfill the requirement for offsite backups.
Cloud Storage
To make sure the plan will be successful, it's important to conduct __________________.
disaster recovery exercises
Using a Caesar Cipher shift 5 decrypt the following :
xtrj rjs nsyjwuwjy snsj rjrtx
Some men interpret nine memos